Book Image

ServiceNow: Building Powerful Workflows

By : Tim Woodruff, Martin Wood, Ashish Rudra Srivastava
Book Image

ServiceNow: Building Powerful Workflows

By: Tim Woodruff, Martin Wood, Ashish Rudra Srivastava

Overview of this book

ServiceNow is a SaaS application that provides workflow form-based applications. It is an ideal platform for creating enterprise-level applications, giving requesters and fulfillers improved visibility and access to a process. ServiceNow-based applications often replace email by providing a better way to get work done. This course will show you how to put important ServiceNow features to work in the real world. We will introduce key concepts and examples on managing and automating IT services, and help you build a solid foundation towards this new approach. You will then learn more about the power of tasks, events, and notifications. We’ll then focus on using web services and other mechanisms to integrate ServiceNow with other systems. Further on, you’ll learn how to secure applications and data, and understand how ServiceNow performs logging and error reporting. At the end of this course, you will acquire immediately applicable skills to rectify everyday problems encountered on the ServiceNow platform. The course provides you with highly practical content explaining ServiceNow from the following Packt books: 1. Learning ServiceNow 2. ServiceNow Cookbook 3. Mastering ServiceNow, Second Edition
Table of Contents (39 chapters)
Title Page
Credits
Preface
Free Chapter
1
Module 1
36
Bibliography

Authenticating users


The vast majority of the content in a ServiceNow instance is private and not available to just anyone browsing around the Internet. To control what users can see and do, you firstly need to know who they are. There are many different authentication mechanisms in ServiceNow, ranging from a simple username and password to complex industry-standard protocols such as Security Assertion Markup Language (SAML) and OpenID.

Using internal authentication

The standard way to prove your identity to your instance is with a username and password. The User table contains user ID and password fields. When an unauthenticated user accesses the instance, a login form is provided. The values that the user provides are compared with those in the User table, and if a set matches, a session is created, the roles associated with that user are recognized, and the user can begin their work. If the optional Remember me checkbox is checked, a longer-life cookie is stored in the browser during the...